We work with Check Point Harmony Endpoint as partners, providing deployment services, particularly for small to medium enterprises (SMEs). We work with both small and large companies.
Technical Director at Geekz Information Technology
Well-designed for security needs and has built-in features
Pros and Cons
- "Stability is good, and the product is well-designed for security needs."
- "Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs."
- "Support needs improvement."
- "Support needs improvement. Currently, support is primarily via email, which leads to longer response times."
What is our primary use case?
What is most valuable?
Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs. It is scalable and offers multiple features, which justify its pricing for enterprise customers. Since security is a major concern, we do not worry about the pricing as the product has features built-in.
What needs improvement?
Support needs improvement. Currently, support is primarily via email, which leads to longer response times. Fine-tuning for applications and better support from Harmony would be helpful, especially once the environment is hardened. Better technical support would enhance the product's competitiveness.
For how long have I used the solution?
We have been working with Check Point Harmony Endpoint for almost five years.
Buyer's Guide
Check Point Harmony Endpoint
May 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
What do I think about the stability of the solution?
Stability is fine, and the product performs well in terms of security. It is considered well and good.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint is scalable, suitable for both small and large companies.
How are customer service and support?
Support service needs improvement. Only email support is available, leading to delays in getting assistance.
How would you rate customer service and support?
Negative
How was the initial setup?
Implementation is straightforward for smaller environments, however, requires significant fine-tuning for larger clients.
What about the implementation team?
We only handle deployment and do not deal with pricing, which is taken care of by another department.
What's my experience with pricing, setup cost, and licensing?
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability. It is suitable for enterprises but can be challenging to position for small to medium customers.
What other advice do I have?
We recommend Check Point Harmony Endpoint; however, support needs enhancement. With improved support, it could outperform competitors. Rating based on the alone featureset is nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Nov 24, 2024
Flag as inappropriate
IT Manager at Bolger Brothers Inc.
Manages to capture more spam with a smaller footprint
Pros and Cons
- "This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits."
- "I would like to see a better UI for admin functions."
What is our primary use case?
We use Check Point to manage email security in our O365 environment. Our previous solution was unable to remove all of the email spam we had. Check Point integrates with Office 365 to provide advanced threat protection for email. It uses techniques like anti-virus, URL filtering, and threat emulation to stop known and unknown threats. It also offers goes beyond email security. It protects all aspects of Office 365 collaboration tools like SharePoint, OneDrive, and Teams. It can prevent data loss, enforce policy compliance, and block phishing attacks.
How has it helped my organization?
It manages to capture more spam with a smaller footprint. It has a single agent and management console to streamline security administration. This can save IT staff time and resources compared to managing multiple security products. The endpoint combines Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) capabilities.
This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits.
What is most valuable?
Ease of setup and ability to hook into O365 directly without MX record changes. Check Point offers advanced threat prevention capabilities, including SandBlast Network Threat Emulation and Threat Extraction. These features can identify and stop even unknown threats by simulating real-world attacks in a safe environment. Check Point solutions are designed to scale to meet the needs of large organizations. They can handle high volumes of traffic without compromising performance. Check Point integrates with a wide range of third-party security solutions. This allows you to create a comprehensive security ecosystem that meets your specific needs.
What needs improvement?
I would like to see a better UI for admin functions. While CheckPoint offers threat prevention through SandBlast, some users feel even deeper integration of Machine Learning (ML) could enhance threat detection and improve automation. This could involve automating security responses and offering threat prediction capabilities. As organizations increasingly move to the cloud, Check Point could further strengthen its cloud-native security offerings. This might involve expanding support for various cloud platforms and offering more granular security controls within those environments.
For how long have I used the solution?
I have used Check Point Harmony Endpoint for six months.
What do I think about the stability of the solution?
We haven't had issues or outages so far.
What do I think about the scalability of the solution?
It seems to be able to scale to any size company.
How are customer service and support?
Their support has been very positive. It's easy to use.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Sophos was our previous vendor, we found their coverage lacking.
How was the initial setup?
The setup was straightforward, it's hands-on config.
What about the implementation team?
CDW was our MSP.
What was our ROI?
We expect to see ROI in 12-16 months.
What's my experience with pricing, setup cost, and licensing?
My advice would be to state terms upfront and always ask to haggle down.
Which other solutions did I evaluate?
We looked at Fortinet, Palo Alto, Crowdstrike, etc.
What other advice do I have?
Make sure to review your solutions every couple years as technology changes.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Harmony Endpoint
May 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
Granular and resilient with many robust features
Pros and Cons
- "The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets."
- "Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries."
What is our primary use case?
In the intricate web of digital landscapes, my primary use of Check Point Endpoint Security is a guardian for my organization's digital footprint. This robust solution stands as a vigilant sentinel, meticulously securing each endpoint against the relentless tide of cyber threats.
Its dynamic threat prevention capabilities, seamlessly integrated into our environment, create an impervious shield against malware, ransomware, and other malicious actors.
With an intuitive interface and real-time monitoring, it not only defends but also empowers, allowing me to traverse the digital domain with confidence.
In this narrative of cyber resilience, Check Point Endpoint Security is not just a tool; it ensures that every endpoint under its watch remains secure in our interconnected digital ecosystem.
How has it helped my organization?
The integration of Check Point Endpoint Security has been a transformative force within my organization.
As we embraced this robust solution, a paradigm shift occurred – a palpable enhancement in our digital resilience. The advanced threat prevention mechanisms woven into the fabric of Check Point have acted as an impenetrable shield, thwarting malicious intruders and fortifying the security posture of every endpoint.
This newfound defense has not only safeguarded our sensitive data but has also instilled a sense of confidence among our team members, enabling them to navigate the digital realm without fear.
What is most valuable?
Check Point Endpoint Security has proven to be a beacon of resilience, with its multifaceted features illuminating our defense strategy. The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets.
The granular control over endpoint activities empowers us to tailor security policies, ensuring a bespoke approach that aligns with our unique operational needs. The intuitive dashboard and centralized management streamline our security operations, enhancing efficiency and providing a comprehensive overview of our digital landscape.
Notably, the seamless integration with other security components orchestrates a harmonious defense orchestra, fostering collaboration and maximizing the synergy of our security infrastructure.
In this narrative of fortified cybersecurity, it's the amalgamation of these features that makes Check Point Endpoint Security an invaluable guardian, fortifying our digital realm against the relentless march of cyber threats.
What needs improvement?
A robust threat intelligence integration could elevate proactive defense, offering real-time insights to anticipate and thwart emerging threats more effectively.
Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries.
Streamlined incident response tools within the platform would empower security teams to react swiftly and decisively in the face of potential breaches. Integration with emerging technologies, such as artificial intelligence and machine learning, could usher in a new era of adaptive and self-learning security protocols.
Furthermore, a user-friendly interface for custom reporting and analytics would empower organizations to derive actionable insights from security data. In this ongoing narrative of cybersecurity evolution, the inclusion of these features in the next release would undoubtedly fortify Check Point Endpoint Security as an even more comprehensive and dynamic guardian in the ever-expanding digital frontier.
For how long have I used the solution?
I've used the solution for more than three years.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
The technical support is excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used to use Kaspersky, and we switched for security reasons.
How was the initial setup?
The initial setup was straightforward; it was easy.
What about the implementation team?
We handled the setup in-house.
What's my experience with pricing, setup cost, and licensing?
Its price is competitive.
Which other solutions did I evaluate?
We also evaluated Trend Micro.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner integrator
System Engineer at Trends and Technologies, Inc
Useful for prevention and detection, and supports Windows 7
Pros and Cons
- "The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read."
- "Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning."
What is our primary use case?
We use the solution in hospitals.
What is most valuable?
The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read.
What needs improvement?
Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning.
For how long have I used the solution?
I have been working with the product for three months.
What do I think about the stability of the solution?
I rate the solution's stability an eight-point five out of ten.
What do I think about the scalability of the solution?
The tool has many modules and is scalable. I rate it an eight-point five out of ten.
How was the initial setup?
I rate the tool's deployment ease an eight out of ten. The process takes less than a day. In our case, however, it required at least three hours because we were doing a demo for Windows 7. We also needed to update the endpoint, which involved some installation requirements.
What's my experience with pricing, setup cost, and licensing?
I rate the solution's pricing a five out of ten. It costs around ₱2,200 per endpoint.
What other advice do I have?
Our customers are mostly medium enterprises. You need to be patient with the scanning. The solution will help you with prevention and detection. I rate the overall product a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
Business Manager at MN World Enterprise Private Limited
Good security and support with an easy implementation process
Pros and Cons
- "The zero-day threat prevention is excellent."
- "I would like to see them add features where we can use this license for mobile browsers, too."
What is our primary use case?
I am using this product to prevent any kind of advanced threats. It keeps monitoring in the backend and does not hamper my ongoing work at all. it also secures my web browsing and has forensics access along with a sandbox to emulate and extract too.
Before using this product, we had tried multiple others yet were not satisfied with the performance and dashboard reports. Check Point products allow us constant filtering and protect us from any kind of threats.
How has it helped my organization?
It has been used for a banking environment and helps us to secure our end computing where USB blocking and even disk encryption and so many features have been bundled together.
Securing our data was critical. It helps a lot and gives control to end users while they connect through the VPN. Secure VPN connectivity is important. It helps us to avoid any kind of risk when users are at home.
It helped us a lot during the first phase of the Covid lockdown, which revealed the benefits of this product.
What is most valuable?
I loved almost all the features.
The zero-day threat prevention is excellent. It gives us more confidence to have automated protection from unknown threats.
It helps to secure our browsing. It can check if something is a genuine page or not. It also masks when we browse or enter our banking user ID and password. This gives us assurance that we are in a green and safe zone.
What needs improvement?
I would like to see them add features where we can use this license for mobile browsers, too - as we had a container kind of product under MDM. This can give us more confidence that when on the go, a user still has full access to our important and crucial data. They should be fearless while accessing this through our VPN tunnel.
Mobile handsets are now used for 40% of work to send mail or forward any kind of document. Securing users on mobile will give more confidence to users and higher authorities that will sometimes need to have access outside of the office for doing their financial or confidential transactions.
For how long have I used the solution?
I've used the solution for more than four years.
What do I think about the stability of the solution?
After using this product last fours year I've never seen a single case where any devices have been affected. Even a lost device has not been a deal breaker. We have full control on end-user clients with the help of Check Point SandBlast.
What do I think about the scalability of the solution?
It is very easy to scale. There are so many testing opportunities and upgrades. The features also do not slow down the CPU. From a stability and manageability point of view, it's very impressive.
How are customer service and support?
Support can help us define and create policies on each and every use case. We also have the in-house expertise to provide support and handle the initial trouble shooting.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were using Symantec and Sophos. There was not 100% clarity on reports, and we had many challenges in terms of upgrading the features.
When we switched to Check Point, we got a single dashboard to control end clients, DLP, and email security. Their collaboration and support team is also awesome.
How was the initial setup?
You can set up the policies very easily. You just post and restart your devices and everything is secure. Items can be managed under group policies. You can set up your own rules and policies easily.
What about the implementation team?
Initially, we had taken advantage of Check Point expertise. Now, an in-house team can handle everything. It is manageable on our side.
What was our ROI?
If you talk about ROI, it's helped us to protect our end-user devices. We've also found the performance of laptops has increased in the past one and a half years. It offers good value for money.
What's my experience with pricing, setup cost, and licensing?
Securing data, peace of mind, great support, good reports, and third-party network audits have made Check Point good value for money.
Which other solutions did I evaluate?
I had tried Palo Alto and Fortinet, however, we got value for money in Check Point. After a POC, we started with Check Point.
What other advice do I have?
There are so many useful examples a normal office could take advantage of. It's a great product for working from home or remote users. The Check Point team is also great and has served us by helping put in place the right kinds of products.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Enhances our organization's cybersecurity posture with its comprehensive set of features
Pros and Cons
- "The Management interface of the product is relatively user-friendly and easy to navigate."
What is our primary use case?
Our primary use case is to enhance the organization's security posture against attacks like phishing, and malware especially zero-day threats, with low false positives. The product must be able to integrate with the existing infrastructure with relative ease.
We need detailed reporting and forensics analysis tools for incident response, and the management console must be user-friendly.
We need to improve operational efficiencies in managing endpoints and thousands of users, given the increasing number of remote workforce. There should be minimal impact on endpoints.
How has it helped my organization?
The management interface of the product is relatively user-friendly and easy to navigate.
The product manages to block most zero-day attacks and unknown threats in real-time, thus reducing the manual overhead by being the first layer of protection against unknown attacks, easing the workload on the monitoring team, and enabling the team to focus on other tasks simultaneously.
Overall, the product enhances our organization's cybersecurity posture with its comprehensive set of features, supported by a leaner monitoring team.
What is most valuable?
The product is quite easy to configure and can be deployed in under half an hour.
It has a centralised management console, single panel to triage, escalate, mitigate and respond.
The agent is lightweight on the endpoints and operates seamlessly in the background with minimal impact on the performance of the endpoints.
It has features like firewalling, removable device control, VPN, app control, DLP, file sandboxing, ransomware protection. which can be turned on or off per endpoint, groups, employees.
What needs improvement?
It should reduce CPU and memory usage. Its technical support could be more timely though it is still acceptable.
It is painful to get deep informational logs to be exported to a SIEM as Check Point requires a user to use its tooling Horizon.
At times, it repeatedly scans the same files without any effective results.
It lacks granular management and configuration.
Additionally, users may encounter challenges with the product's components not performing as anticipated, necessitating the manual addition of exclusions across various areas.
For how long have I used the solution?
We have been using Check Point Harmony Endpoint for less than three months.
What do I think about the stability of the solution?
The stability is acceptable.
What do I think about the scalability of the solution?
The scalability is okay.
How are customer service and support?
The support could be faster.
How would you rate customer service and support?
Neutral
How was the initial setup?
The setup could be done in less than 30 minutes.
What's my experience with pricing, setup cost, and licensing?
The licensing is pricy, so weigh the pros and cons.
Which other solutions did I evaluate?
We looked at CrowdStrike and Palo Alto.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical Sales / Presales at Routelink Integrated Systems
A stable tool to secure endpoint devices and manage all devices from a centralized portal
Pros and Cons
- "It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
- "Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors."
What is our primary use case?
I use Check Point Harmony Endpoint in my company to secure the endpoint devices, including computers, servers, and every single endpoint in the environment.
How has it helped my organization?
Check Point Harmony Endpoint offers customers enterprise-level security for all their devices, including servers, laptops, and desktops. The IT personnel can ensure that with the product, all of the devices in an environment are protected with Check Point's enterprise-based solution. The customers who buy the product need not worry about their devices being exposed to threats. In fact, if you check the reports for Check Point in Gartner Magic Quadrant, you will see that the reports are all related to Check Point's endpoint security solutions. Customers try to get information on the value they can derive, along with the other potential prospects in the market, before trying to get or onboard Check Point Harmony Endpoint in their environment.
For IT personnel, Check Point Harmony Endpoint is easy to manage since they don't need to have any expert in order to deploy or monitor devices with the help of the product, and it also allows you to try out different actions on different devices. Whenever there is an attack on any device, Check Point Harmony Endpoint has the capability to isolate the affected device from the environment. Suppose there is an attack on one computer. In that case, the security of the other computers operating in the same environment is compromised, so Check Point Harmony Endpoint isolated the affected computer and notified the required department in the company to look into it while allowing for the other computers to work properly. The product offers good value to the companies that deploy it in their environment.
What is most valuable?
I would have to describe what I feel is valuable in Check Point as a whole. Check Point provides users with a central point from where they can manage all the devices across a workplace. Whether users use Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, they don't have to log into different portals or solutions since they can manage everything from one central point. I like the fact that products from Check Point are very easy to deploy. Even if a user has 1,000 endpoints in an environment, Check Point can take care of the deployment in minutes. Check Point Harmony Endpoint is a very easy solution to deploy and requires very little maintenance or technical expertise.
What needs improvement?
I would like to see improvements in Check Point Harmony Endpoint in general because some people use it since it is available at a competitive price. Due to the competitive pricing strategy of Check Point Harmony Endpoint, it is not considered to be a good product, like Fortinet, Palo Alto, or F5. Check Point Harmony Endpoint needs to consider that people should feel that Check Point doesn't compromise on quality even though the price at which Harmony Endpoint is offered is good. People who claim that Check Point Harmony Endpoint is a cheap product don't necessarily mean that it is not a good solution. Fortinet is a very expensive product that offers good value to its customers. If Check Point can work on the value proposition it offers to customers and make them understand that even though the solution is affordable, it is not a bad solution compared to its competitors, then it would be fantastic. The potential customers can opt for Check Point products, considering that they are offered good products at the cheapest price in its categories. It is important for Check Point to ensure that people don't have a wrong perception about the products it has launched in the market.
I don't think there are any features I would like to include, and the tool offers updates when compared with the products from competitors, which I think is a good way to do it. The only challenge is that for many organizations where there is an MDM solution in the environment and an endpoint security tool, my company needs to educate such organizations to convey the message that endpoint and MDM solutions are different products for different purposes, so they are not the same. If Check Point Harmony Endpoint can incorporate MDM into the solution, it can be a fantastic enhancement. Customers need not buy endpoint and MDM solutions if both are made available together in Check Point Harmony Endpoint. My company will have to put extra effort into educating the customers and making them understand the two different solutions. MDM is used to manage your mobile devices, and Check Point Harmony Endpoint is the security for your endpoints.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for over three years.
What do I think about the stability of the solution?
It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution.
What do I think about the scalability of the solution?
It is a very scalable solution.
How are customer service and support?
My company had to contact Check Point's technical team for the installations that my company carried out when we had to deal with around 40 devices that had firewalls from Check Point, which had reached the end of life. For Check Point Harmony Endpoint, my company never had any reason to contact Check Point's technical team.
Which solution did I use previously and why did I switch?
Starting with the pros, I would say that Check Point Harmony Endpoint provides value for money. After purchasing Check Point Harmony Endpoint, you need to consider the fact that the cost you pay for the solution and the value you derive from the product is very proportional. When it comes to Check Point Harmony Endpoint, I can say that a user does not pay high prices for a poor solution. A user pays a decent fee for a very good product. I think the first pro is that the value you get from the solution is made available at a very competitive price. The product is seamless and easy to use. With the centralized portal, a user can manage all Check Point products, including Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, from a single point, which is also a fantastic pro for Check Point. Regarding the cons of the solution, I would say that it stems from people's perception of the solution since they feel that an affordable product may not be good enough. There is a need to work around people's wrong perception of Check Point products. Still, I don't know if such a negative perception is something that is widespread across the globe or whether it is exclusive to Nigeria or the markets in Africa. Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors.
How was the initial setup?
The product's initial setup phase was straightforward. The product's deployment was done in minutes, so it didn't take long, as there was no need to do any special configurations. There was no need for the people involved in the deployment to have any special skills. The deployment process was seamless and straightforward. The product's deployment was never an issue. The IT department need not worry too much about whether they need to learn new skills to manage the product as it is easy to use and deploy and a product that can be used seamlessly. The product's deployment takes around 30 to 40 minutes.
I work with the solution's SaaS version.
What other advice do I have?
I don't think Check Point Harmony Endpoint is difficult to maintain. I think there is a possibility of scheduling your updates in Check Point Harmony Endpoint, even if you want it to happen outside your working hours, like somewhere between eight o'clock in the evening and midnight. I don't think maintenance is stressful because it can be scheduled outside of working hours.
I would recommend others to use the product since the deployment process is seamless, so you don't need any specialized skills to use the portal provided by Check Point to monitor your devices. There are no specialized skills required to support or maintain the solution. It is also very easy to implement the product. You can keep a tab using the centralized portal offered by the product. In general, the product makes the life of the IT department easier since you need not worry about a lot of the technical stuff related to the solution.
From my point of view, I need to put in extra effort to convince my company's customers to use the solution. In terms of the features and the product's ability to deliver the promised value to its customers, especially when compared to other solutions in the market, I rate the overall product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Network Engineer at RSUP Dr. Sardjito
Great real-time scans, east central management, and helpful support
Pros and Cons
- "The reporting feature where we can see and monitor what happened on our client computers is useful."
- "They need to make the user interface on the server more intuitive and user-friendly."
What is our primary use case?
We use Check Point on our 500 computers to protect them from viruses and malware. The network is a protected local area network with limited connectivity to the internet. Not all computers are connected to the internet; only users with the necessity to connect can access it. We also increase the protection from viruses/malware by disabling USB ports for mobile storage. With all the protection steps taken, we still see that antivirus is a must to have as standard computer protection.
How has it helped my organization?
With all security steps taken to protect the network, viruses and malware still appeared in the network. Check Point Harmony Endpoint (endpoint antivirus) has helped our organization by preventing further damage to the computers and the network by detecting and taking appropriate action (quarantine, clean, delete) to viruses and malware.
By doing this, our organization's business can maintain its operational state without any significant disturbance, and that is the most important thing to achieve.
What is most valuable?
Some of the most valuable features from Check Point include:
1. Its ability to run real-time scans in the background and detect all the malware and viruses while taking action to clean the system from the threat.
2. On-premise centralized management, so the client can do signature updates locally and save the internet bandwidth.
3. The reporting feature where we can see and monitor what happened on our client computers. For example, which client has out-of-date signatures, which client is infected by what virus, et cetera.
What needs improvement?
Some areas of improvement could be :
1. Making the user interface on the server more intuitive and user-friendly.
2. Making it easier for the user to do tuning and configuration to the server or the client application. For example, to turn off notifications, the user should be able to do that with some clicks on the user interface instead of searching and reading about how to do it in the knowledge base first and then trying to do it.
3. Our application version is quite old, and Check Point already released a newer version for endpoint protection, which includes a cloud version. After doing some trials, we see that Check Point already made many improvements to the features and user interface.
For how long have I used the solution?
I've been using the solution for five years.
What do I think about the stability of the solution?
Tthis solution runs with good stability.
What do I think about the scalability of the solution?
If we deploy it on-premise, we should see the server hardware requirement first and match it with the number of clients we want to handle.
How are customer service and support?
Customer service gave good support when we needed it. For example, when we need support on renewing the license or when we need to upgrade the client version, they have a quick response time to deal with the problem.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did use a different solution previously. We switched as we want to use the same brand for our NGFW and our endpoint protection.
How was the initial setup?
The setup was quite straightforward. We installed the server first and then made the client installer. If you have an active directory on the network, you can install it with push installation. That said, we don't have it, so we needed to install the client by accessing the client directly.
What about the implementation team?
We implemented the product together with the vendor and an in-house team. The vendor team has good knowledge when it comes to implementing the product.
What's my experience with pricing, setup cost, and licensing?
At the time we purchased it, the licensing was separated into some modules. There were antivirus modules, data protection modules, and full modules if I'm not mistaken. You should make sure that the module you choose fits your requirement.
Which other solutions did I evaluate?
We evaluated the ESET antivirus.
What other advice do I have?
Check Point has released their new product on endpoint protection, which includes a cloud version. You could try it for free to see if this product matches your needs before purchasing it.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
Elastic Security
Symantec Endpoint Security
HP Wolf Security
Cisco Secure Endpoint
Trend Vision One Endpoint Security
Kaspersky Endpoint Security for Business
Trellix Endpoint Security
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?